Q1 2024 – a brief overview of the main incidents in industrial cybersecurity | Kaspersky ICS CERT (2024)

  • Q1 2024 – a brief overview of the main incidents in industrial cybersecurity | Kaspersky ICS CERT (1)
  • Q1 2024 – a brief overview of the main incidents in industrial cybersecurity | Kaspersky ICS CERT (2)
  • Q1 2024 – a brief overview of the main incidents in industrial cybersecurity | Kaspersky ICS CERT (3)
  • Q1 2024 – a brief overview of the main incidents in industrial cybersecurity | Kaspersky ICS CERT (4)

Download PDF

    In this overview, we discuss incidents caused by attacks on industrial organizations. A separate report is devoted to technical researches of attacks, that have been published during the reporting quarter.

    Some links to corporate website pages on which information on incidents was originally published may be ‎broken by time of the report release because the information has been removed from these websites. Still, we keep all the ‎links to emphasize the information below is based on statements made by victim companies themselves.

    This overview includes information on the incidents such that either the affected organization or the responsible government officials publicly confirmed the compromise. Compromise reports and claims made by cybercriminal groups only are not discussed on purpose.

    Quick stats for the quarter

    • A total of 30 incidents were confirmed by victims. This is in line with previous time periods (60+ publicly confirmed cases per half year).
    • 37% of victims reported denial of operations or product shipment caused by the incident – the proportion is almost the same as the previous time period (37.5% for H2 2023).
    • Almost half (47%) of all incidents resulted in disruption of the victims’ public digital services.
    • The victims belong to the following industries/sectors: manufacturing (including automotive, aerospace, pharmaceutical, food and beverages, clothing, cosmetics and many other sub-sectors), utility, energy, transportation and logistics, engineering,and mining.
    • 2/3 of victims are in the manufacturing sector. 50% of all manufacturing victims reported denial of operations, which is 100% of all victims that confirmed operational interruption as a result of an attack. Either the sector is less resilient to attacks, or organizations within the sector are simply more honest in their public reporting.
    • None of the victims who operate critical infrastructure, such as those in the energy and utility sectors, reported any significant damage – something that we are all used to.
    • The most affected countries are:
      • US – 1/6th of all victims
      • Germany – 1/6th of all victims
      • France, Belgium, Netherlands – 1/10th each.
    • There are some countries from which we rarely see public confirmation of incidents: North Macedonia, South Africa, Singapore.
    Q1 2024 – a brief overview of the main incidents in industrial cybersecurity | Kaspersky ICS CERT (6)

    Manufacturing

    Lush hit by ransomware

    Manufacturing| Data leakage, denial of IT systems | Ransomware

    UK cosmetics manufacturer Lush was the victim of cyberattack, it was reported on January 11. The company took immediate action to secure and screen all systems in order to contain the incident and limit the impact onitsbusiness. The company worked with external ITforensic specialists to carry out a thorough investigation. Lush also notified therelevant authorities. The nature of the incident was not initially disclosed. On January 25, Lush’s name appeared on the Akira ransomware gang’s data leak site. The group said it had stolen 110GB of data from Lush, allegedly including many personal documents suchaspassport scans, and company documents related to accounting, finance, tax, projects, and customers. On January 29, a Lush spokesperson said in an updated statement thatthe company had experienced a ransomware incident that resulted in temporary, unauthorized access to part of its UK IT system. The company took immediate steps to respond tothematter and, after a short period of limited disruption, the company was operating largely as normal. The external specialists worked to validate the attackers’ claims regarding data they had taken relating to Lush.

    Benetton hit by cyberattack

    Manufacturing | Denial of IT systems, denial of service and operations

    Italian clothing manufacturer Benetton Group was the victim of a cyberattack on the night of between January 18-19, the company announced. The company’s e-commerce servers and systems at its logistics hub in Castrette di Villorba were affected. Workers were sent home and logistics operations were disrupted. According to the announcement, for a few days therewere disruptions to services due to promptly shuttingdownthe servers to secure the entire IT infrastructure and isolate it from external aggression. TheITintervention group responded immediately by implementing all countermeasures aimed at mitigating the attack, allowing normal operations in almost the entire global commercial network. By Monday January 23, the company expected to resume a significant portion of its operations at all locations.

    Varta hit by cyberattack

    Manufacturing, automotive | Denial of IT systems, denial of operations

    Varta, a German manufacturer of batteries for the automotive, industrial and consumer sectors, disclosed that its systems were affected by a cyberattack on February 12. The incident disrupted production and administrative processes at five of the company’s manufacturing plants. Varta shut down its IT systems and disconnected from the internet while it investigated the incident. The company said it had implemented the measures in its contingency plan and formed a task force of cybersecurity experts and data forensic specialists to assist with system recovery. On February 22, Varta issued an update stating thatthecompany’s availability was still limited and that there was no information on how long itwould take to process and resolve the attack or when production at all five global production sites would be fully operational. The first of the plants were expected to start up again within the following week after the update. Non-IT processes resumed, including the deployment of personnel to all plants for maintenance, servicing and preparatory work. Theauthorities were informed and the police opened a formal investigation.

    Aztech Global hit by ransomware

    Manufacturing| Denial of IT systems | Ransomware

    Aztech Global, a Singapore-based manufacturing services provider, announced onFebruary12 that it was the victim of a ransomware cyberattack that allowed cybercriminals to gain unauthorized access to its computer network. The company took immediate action, including shutting down its servers during the Chinese New Year holidays and using cybersecurity software to ensure that no other data was affected. Aztech Global also engaged third‑party forensic consultants to investigate the incident and notified the relevant authorities, while seeking advice to strengthen its IT security.

    Continental Aerospace hit by cyberattack

    Manufacturing, aerospace| Denial of operations

    Continental Aerospace, a US aircraft engine manufacturer, fell victim to a cyberattack thatdisrupted its operations. The company announced on its website banner on February20 that it was working with experts to resolve the issue and hoped to resume normal operations soon. No further details were provided regarding the end of the attack, the extent ofthedisruption, or a possible data breach. Continental Aerospace actively engaged with a team of experts to resolve the issues as quickly as possible.

    Etesia hit by cyberattack

    Manufacturing| Denial of IT systems, services and operations

    French mower manufacturer Etesia was the victim of a cyberattack on February2, according to local press reports, forcing 160 employees to work part-time. The attack disrupted telephone calls, emails and internal manufacturing processes. Since February 20, the company’sactivities have gradually resumed after being completely blocked.

    Kind hit by cyberattack

    Manufacturing| Denial of IT systems, denial of services

    German hearing aid manufacturer Kind was hit by a cyberattack on February 6. According toa company spokesperson, there were irregularities in the IT system. The company’s own ITdepartment began to take security measures. The police and the data protection officer were informed. Communication with more than 600 specialist stores was affected. Afterthe IT failure, contact was only possible by telephone. Orders couldn’t be entered directly on computers and were sometimes recorded with pen and paper. There was no evidence that customer data was stolen. The systems were immediately shut down, checked by external specialists, and gradually brought back online.

    International Paper hit by cyberattack

    Manufacturing| Denial of IT services, denial of operations | Supply chain/trusted relationship

    US paper and packaging manufacturer International Paper was hit by a cyberattack, according toa statement. The company initiated response and containment plans, including notifying the appropriate authorities. Out of an abundance of caution, International Paper coordinated an orderly shutdown of the mill to address the issue and at the time of the statement was in the process of restarting themill. A company spokesperson said the attacker accessed International Paper’s system through a third-party vendor and did not directly target the company or the mill. The attack affected only a limited number of manufacturing systems at the Riegelwood mill. No other mills, sites or systems were affected. The company was not aware of any sensitive, proprietary, personnel or business data being compromised.

    Polycab hit by ransomware

    Manufacturing| Ransomware

    Polycab, an Indian manufacturer of cables, wires and related products, was the target ofaransomware attack on its IT infrastructure on March 17. According to a regulatory filing, theincident did not affect the company’s core systems and operations. The company’s technical team, along with a specialized team of external cybersecurity experts, worked actively on analyzing the incident. On March 26, the Lockbit ransomware group added Polycab toits list of victims on its dark web site.

    Nampak hit by ransomware

    Manufacturing| Data leakage, personal data leakage, denial of IT systems | Ransomware

    South African packaging manufacturer Nampak detected unauthorized activity on its ITsystems on March 20. In a statement on its website, Nampak said an unknown third party had gained access to its IT systems despite its robust and embedded security protocols. The company immediately took the necessary steps to contain, assess andremediate the incident. Nampak took the necessary steps to determine the scope ofthe compromise, restore the integrity of its information systems and ensure that it was not exposed to further risk. The company said the breach had not affected its manufacturing facilities and operations, which continued to function as normal, with some manual systems being used where necessary. Nampak made an initial notification to the information regulator. OnMarch26, the Lockbit ransomware group added Nampak to its list of victims on its dark web site. OnApril4, Nampak issued an update stating that the affected data may include files related tothe company’s legal, finance and human resources functions. Such files may contain certain personal information relating to individuals and legal entities.

    Sprimoglass hit by ransomware

    Manufacturing| Denial of services, operations and product delivery | Ransomware

    Belgian glass manufacturer Sprimoglass was hit by a cyberattack that halted its production, which became known in early March. According to a local media video, the company knew about the cyberattack on February 23 and was shut down for about 10 days. About six to seven hundred computers had to be completely reformatted. At the time of the video story, a number ofproduction lines had resumed operations three days earlier, and 20-30% of employees had already returned to work, with the rest of the workforce on technical unemployment. The attack had a serious impact on employees, and on customer deliveries, which were postponed. Representatives of the company said that they would begin production properly, step by step, without having to pay a ransom.

    BerlinerLuft hit by cyberattack

    Manufacturing, engineering| Denial of IT services, denial of operations

    German engineering and manufacturing company BerlinerLuft fell victim to a cyberattack on March 16. According to a message on its website, the company became unavailable via itsusual telephone numbers and email addresses. The company’s team worked to restore normal availability as quickly as possible. The company warned that due totheITemergency, there may be short-term limitations in business operations, and there would probably be disruptions in the production/manufacturing process anddelivery delays. The relevant criminal and state data protection authorities were informed. On March 27, the company issued an update stating that production of duct components, louvre flaps and sound insulation baffles had resumed at its German and Polish facilities and that email and telephone communications had been restored.

    EAS hit by ransomware

    Manufacturing, engineering |Data leakage, denial of operations |Ransomware

    Dutch mechanical engineering and manufacturing company EAS Europe was the victim of a ransomware attack on February 26, according to a notice on its website. The attackers encrypted EAS Europe servers and may have stolen sensitive data from the EAS servers. Customer and supplier data may have been taken. EAS worked with a cybersecurity firm to assess the scope of the incident and to further improve its cybersecurity and data protection. As a result of the incident, operations in the Netherlands were suspended while the company restored the backups. The Qilin ransomware group added EAS change systems to its list of victims on April 6.

    Kampf hit by ransomware

    Manufacturing | Denial of IT systems |Ransomware

    German slitting and winding machines manufacturing company Kampf GmbH was the victim of a cyberattack on February 24 that used special software to partially encrypt its IT systems. According to a message on its website, the company immediately disconnected all external connections and shut down all IT systems. Kampf investigated the extent of the attack with the support of external cybersecurity experts and forensic specialists. The company notified and cooperated with all the relevant authorities. It couldn’t rule out the possibility that data had been extracted. In the March 4 update, the company stated that all Kampf Group companies that were taken offline as a precautionary measure were back to normal operations, with the exception of Kampf GmbH and Atlas Converting Equipment Ltd. All other members of the Jagenberg Group were working without restrictions.

    Electronics

    Foxsemicon hit by ransomware

    Manufacturing, electronics |Denial of IT services, data leakage, personal data leakage | Ransomware

    On January 15, semiconductor equipment manufacturer Foxsemicon Integrated Technology, a subsidiary of Taiwanese electronics giant Foxconn, was the victim of a cyberattack. Thecompany’s website was defaced with a message claiming that data had been stolen andencrypted. The message said 5TB of data had been taken from the company’s systems. The cybercriminals claimed to have obtained personal data belonging to customers andemployees, and threatened to make it public on their leak website unless a ransom waspaid. The ransomware group did not identify itself on the defaced Foxsemicon website, butthelinks provided to the company pointed to the LockBit Tor-based leak site. Shortlyafter, the company told the Taiwan Stock Exchange that it had recovered the website immediately after detecting the ransomware attack and was working with security experts. However, various sections, including the English and Mandarin versions and the corporate andfinancial sections, remained inaccessible. Foxsemicon also added that the incident shouldnot significantly affect its operations.

    Hewlett Packard hit by cyberattack

    Manufacturing, electronics | Data leakage |APT

    On January 19, Hewlett Packard Enterprise filed a Form 8-K with the US Securities and Exchange Commission (SEC), reporting unauthorized access to the company’s cloud-based email environment by a threat actor believed to be Midnight Blizzard (aka Dukes, CozyBear and NOBELIUM/APT29/BlueBravo). HPE was notified of the cyberattack by an unknown entity on December12, 2023. It is believed that the attackers had been accessing and exfiltrating data since May 2023. Corporate data from a “small percentage” of HPE mailboxes and a “limited number” of SharePoint files belonging to employees in cybersecurity and other business units were accessed and stolen. The company, with the assistance of external cybersecurity experts, immediately activated its response process to investigate, contain, and remediate theincident and eradicate the activity.

    Automotive

    ThyssenKrupp hit by cyberattack

    Manufacturing, automotive|Denial of IT systems, denial of operations

    German steelmaker and automotive supplier ThyssenKrupp said in a statement that itsuffered a cyberattack that affected its auto body manufacturing division, ThyssenKrupp Automotive Body Solutions. Automotive Body Solutions was able to detect the incident early and start working to contain the threat and mitigate the impact. At the same time, ThyssenKrupp clarified that no other business units or segments were affected. Varioussecurity measures were taken and certain applications and systems were temporarily taken offline. A German news agency was the first to reveal the attack, reporting that the incident directly affected ThyssenKrupp’s plant in Saarland, which employs more than a thousand workers. The company confirmed to BleepingComputer that production was halted but clarified that deliveries to customers had not been affected.

    Pharmaceutical

    HAL Allergy hit by ransomware

    Manufacturing, pharmaceutical| Data leakage, denial of services, product delivery delay | Ransomware

    On February 19, Dutch pharmaceutical company HAL Allergy Group was hit by a ransomware attack, according to a statement on its website. The company may have experienced a delay inprocessing orders or delivering products. HAL Allergy immediately engaged external cybersecurity experts to help restore the affected network, and a forensic investigation waslaunched. The company could not rule out the possibility that personal data of individuals may have been compromised. The measures taken by the company included disconnecting the network fromthe internet, restoring data, notifying the Dutch Data Protection Authority and contacting theDutch police. The Ransomhouse group added HAL Allergy to its list of victims onthe dark web on February 28.

    Food and beverages

    Duvel Moortgat hit by ransomware

    Manufacturing, food and beverages|Denial of IT systems, denial of operations |Ransomware

    Belgian brewery Duvel Moortgat confirmed to local press that it fell victim toaransomware attack. Production was largely halted. The cyberattack was discovered on March 6 at the brewery in the province of Antwerp. The servers were apparently infected with malware and were shut down. A company spokesperson explained that sites in Belgium and a site in the US were affected. TheITdepartment acted immediately and worked to find out exactly what had happened. Production in Antwerp resumed on March 7. The Stormous ransomware group claimed responsibility for the cyberattack on Duvel Moortgat on March 7, saying that 88GB ofdata was stolen. On March 12, the Black Basta ransomware group also added Duvel Moortgat and Duvel-owned Boulevard Brewing in the United States to its list of victims on its dark web site.

    Koffie Beyers hit by cyberattack

    Manufacturing, food and beverages

    Belgian coffee producer Koffie Beyers was hit by a cyberattack, police confirmed. The investigation was ongoing and it was not clear what the impact oftheattack was. The police also investigated whether there was a link to the cyberattack onDuvel Moortgat – the companies were hit around the same time and are based less thanamile apart in the municipality of Puurs-Sint-Amands. It was specified that this was aseparate case, but the police said they would compare them to see if there were any similarities.

    Utility

    Southern Water hit by cyberattack

    Water supply, utility | Personal data leakage

    Southern Water, a private utility company in the UK, acknowledged that cybercriminals claimed to have stolen data from some of its IT systems. The company said in a statement on January 23 that it had previously detected suspicious activity and had launched aninvestigation led by independent cybersecurity specialists. It said there was noevidence that customer relationships or financial systems had been affected. Thecompany’s services were unaffected and continued to operate normally. Southern Water reported the incident to the government, regulators and the Information Commissioner’s Office. TheBlack Basta ransomware group claimed responsibility for the attack and published a selection of the data itclaimed to have stolen, which included scans of identity documents such as passports and driving licenses; documents that appear to be HR-related and which show the personal data of what could be customers, including home and office addresses, dates of birth, nationalities and email addresses; and corporate car-leasing documents containing personal data.

    Veolia hit by ransomware

    Water supply, utility | Denial of IT systems, denial of services, personal data leakage | Ransomware

    The North American municipal water division of Veolia, a French transnational utility company, experienced a ransomware incident that impacted certain software applications and systems. The company’s IT and security incident response teams mobilized quickly and collaborated with law enforcement and other third parties to investigate and resolve the incident. According to a statement published on January 19, the company implemented defensive measures, including taking the affected back-end systems and servers offline until they could be restored. Water and wastewater system operations were not disrupted by the ransomware attack. Some customers experienced delays when using online bill payment systems. During the investigation, the company identified a limited number of individuals whose personal information may have been compromised.

    Muscatine Power and Water hit by ransomware

    Water supply, energy, utility | Denial of IT services, personal data leakage | Ransomware

    US utility company Muscatine Power and Water (MPW) discovered a cybersecurity incident impacting its corporate network environment. After a brief disruption to the company’s corporate business systems and a careful internal and external review, all MPW business systems were restored to an operational state. According to a press release posted on its website on January 29, all office, field, and power generation operations were functioning as normal. The company worked with a team of forensic experts to fully understand the extent and implications of the incident and to restore operations within a secure and remediated network environment. Later, MPW issued an update confirming a ransomware incident identified on January 26. It stated that MPW’s team quickly mobilized and deployed new equipment to restore internet services within eight hours. MPW’s affected business systems were also restored that same weekend, allowing MPW to conduct normal operations when they opened for business at 8am on the Monday. MPW also notified state and federal law enforcement and regulatory agencies. The forensic investigation revealed that some current and former customer data, such as address, social security number, driver’s license, etc., may have been compromised in the incident.

    Stadtwerke Bruck hit by cyberattack

    Energy, utility | Denial of IT systems, denial of services

    Austrian utility company Stadtwerke Bruck discovered a security incident in the IT systems ofthe municipal utility administration on March 4. According to a message on its website, theaffected services were quickly restored and the company was fully operational from March11. The business data was reconstructed from the data backup. An IT forensic investigation was conducted to determine the nature and progression of the security incident and to determine the appropriate course of action. There was no indication that any data had been removed from the company’s systems at the time of notification. For reasons oftransparency, an initial preventive report was submitted to the relevant authorities.

    Power and energy

    MEPSO hit by cyberattack

    Energy | Denial of IT systems, denial of IT services

    The Electricity Transmission System Operator of the Republic of North Macedonia (MEPSO) confirmed that it was hit by a cyberattack. In a March 7 press release, the company emphasized that the cyber-incident did not target its critical energy infrastructure, which remained secure and fully operational. MEPSO assured that the power grid’s integrity and the electricity supply were not compromised. The company reported the cyberattack to the relevant authorities in accordance with cybersecurity regulations. MEPSO’s team, incollaboration with cybersecurity experts, worked to mitigate the effects of the cyberattack and normalize the company’s day-to-day operations. On March 11, MEPSO announced thatit* website was up and running. MEPSO stated there was no ransom demand tounlock parts of the hacked information system.

    Schneider Electric hit by ransomware

    Energy|Data leakage, denial of IT services |Ransomware

    BleepingComputer learned that on January 17 a ransomware attack hit the Sustainability Business division of the French multinational energy company Schneider Electric. Schneider Electric was targeted by the Cactus ransomware attack, resulting in the theft of corporate data. The attack disrupted part of Schneider Electric’s Resource Advisor cloud platform. In a statement to BleepingComputer, Schneider Electric said the attack was limited to this one division and did not affect other parts of the company. Officials from the sustainability division contacted customers affected by the attack. A detailed analysis of the incident was conducted with leading cybersecurity firms. The company worked to restore operations in the division for the next two days after confirmation. Later, the company issued the same statement on its website, adding that access to business platforms was restored on January 31.

    Logistics and transportation

    GCA hit by cyberattack

    Transportation, logistics|Denial of IT services

    French transport and logistics company GCA (Groupe Charles André) suffered a cyberattack during the night of February 17-18, resulting in an interruption of its internet access andthedisruption of its usual communications, according to a message sent to its customers. No data leakage was reported, and the company investigated with external specialists and in conjunction with ANSSI. The usual email addresses, landlines, EDI connections, APIs, became inoperable. GCA didn’t specify if the encryption of the systems was observed.

    AB Texel hit by ransomware

    Logistics |Ransomware

    On February 15, Dutch logistics company AB Texel fell victim to the Cactus ransomware group, according to a statement on its website. The recovery process was started immediately. The attack had no impact on the company’s services. Operations continued, the company supplied its customers and kept customers and employees informed. The incident was immediately reported to the Dutch Data Protection Authority. AB Texel also planned toreport the incident to the police. The Cactus ransomware group added AB Texel Netherlands to its list of victims on February 28.

    Radiant Logistics hit by cyberattack

    Transportation, logistics|Denial of services

    Radiant Logistics, an international freight company, isolated its Canadian operations following a cybersecurity incident. In a filing with the US Securities and Exchange Commission (SEC), Radiant specified that it detected the incident on March 14. Canadian customers experienced delays in service, but service in other countries was not affected. Upondetection, the company immediately initiated its incident response and business continuity protocols and began taking measures to disrupt the unauthorized activity.

    Other

    Alamos Gold hit by cyberattack

    Mining|Data leakage, personal data leakage

    Canadian mining company Alamos Gold fell victim to a cyberattack that took place sometime in April 2023. The attack resulted in the public disclosure of confidential corporate data last year, according to a local media report. The data included sensitive information such as social insurance numbers, payroll reports, financial information, and home addresses and mobile phone numbers for senior executives, all of which were published online by the hackers, the report said. The attack was apparently carried out by the Black Basta ransomware group. According to the Alamos statement, the company’s operations were not affected at any time, the company remained vigilant in protecting its systems and put measures in place to address any loss of personal information.

    automotive

    data leakage

    denial of IT services

    denial of operations

    denial of production

    denial of shipment

    electronics industry

    energy sector

    logistics

    manufacturing

    mining

    personal data leakage

    ransomware

    supply chain

    transportation

    utilities

    water supply

    Q1 2024 – a brief overview of the main incidents in industrial cybersecurity | Kaspersky ICS CERT (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Foster Heidenreich CPA

    Last Updated:

    Views: 5791

    Rating: 4.6 / 5 (76 voted)

    Reviews: 91% of readers found this page helpful

    Author information

    Name: Foster Heidenreich CPA

    Birthday: 1995-01-14

    Address: 55021 Usha Garden, North Larisa, DE 19209

    Phone: +6812240846623

    Job: Corporate Healthcare Strategist

    Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

    Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.